Leader: Gan Wei Liang (Search for low-cost (in terms of proc power) encrpytion and image processing algorithms, and experimentation)
Member: Bay Wei Heng (Research and Research)
Member: Joel Tan (Integrate algorithm into iphone application)
Area of Focus: 1) Computers 2) Signals Processing 3) Software Engineering
Research Paper
Algorithm-based software engineering , integration of programming and web development
Resaerch Area:
Cryptography: A way of hiding information, usually extremely important
Specifically encryption of binary strings and Image Processing
Binary Strings: A sequence of numbers consisting of only ones and zeroes
Image Processing: Doing signal processing on an image to produce an output
Why encrypt?
Encryption allows for information to be transferred between non-secure platforms securely
History of Cryptography:
During WWII, the Germans communicated via transmitted coded messages to each other. Even if the British were able to intercept the messages, they could not understand what they meant, as the Germans had used a machine called the Enigma, which was able to code and decode the messages via the same process, given a key.
Projects Day
What:
Cross-platform web application to send messages safely and securely
How:
Text messages will be converted to black and white images
The image will be dissected into pixels, which can then be compressed into strings through image compression
These strings can then be encrypted before being converted back into an image, which contains random black and white pixels
This image may be embedded into another image with to obtain a fixed file size, and noise will be added for the other parts of the image.
This image is then sent to the other user, where the process is reversed and the original message can be obtained
The message can be handwritten for further security as it is more difficult to spot font patterns in handwritten messages and text messages
Who (Target Audience):
Everyone
When (Proposed Timeline):
December Holidays: Read on various encryption methods and build up a formidable research pool
T1W1 to T1W8: Decide on language used, begin coding algorithm (for encryption of binary)
T1W9-End of March Holidays: Draft out project's day powerpoint and continue coding
T2W1-Prelims: Finish coding, research on different ways to convert different types of images (jpg, emf, bmp, png etc.) into binary form, rehearse presentation
Prelims-T2W9: Code an image-to-binary algorithm for bmp, possible extensions to other file formats if possible
T2W10-End of June Holidays: Converting code such that it is suitable for the platform/application (i.e. iPhone app), Uploading onto platform, test runs
T3W1-Semi-finals: Upgrading code (Look for more efficient algorithms that achieve the same level of security), Preparing for presentation
Semi-final to Finals: Promoting application to test subjects
Finals to Grand-Finals: Feedback
Why (Advantages):
Handwritten messages are more unpredictable than typewritten messages
Image will be hard to decrypt using conventional means (there are nCK combinations of black and white pixels)
No one would guess that a weird image would be a secret message!
Brute force cannot be used even if the hacker knows the algorithm but not the key, as the computer cannot recognise that an image is actual text (unless it uses OCR, which is extremely time-consuming, or if the hacker sits at the computer rejecting wrong decoded messages all the time)
Possible Extensions:
Image size can be tweaked (i.e. variables in encryption code change as image size changes)
Colour Images can be included
Adding additional layers of security (e.g. a password to access the image, for starters)
Mr Tan's Feedback
Everything is in place from Intro to Methodology. However, nothing on eXperimentation/disscussion/Conclusion Things to do
1) Methodology
- State the method use to create CAPTCHAs (Algo)
- Concept behind the algo
- Comparison & distinction from other Methods
2) Discussion - Examples of your Captchas
- Test setups
- Testing it on machines (?%)
- Testing on Humans (?%)
- Test Result discussions
Member: Bay Wei Heng (Research and Research)
Member: Joel Tan (Integrate algorithm into iphone application)
Area of Focus: 1) Computers 2) Signals Processing 3) Software Engineering
Research Paper
Algorithm-based software engineering , integration of programming and web development
Resaerch Area:
Cryptography: A way of hiding information, usually extremely important
Specifically encryption of binary strings and Image Processing
Binary Strings: A sequence of numbers consisting of only ones and zeroes
Image Processing: Doing signal processing on an image to produce an output
Why encrypt?
Encryption allows for information to be transferred between non-secure platforms securely
History of Cryptography:
During WWII, the Germans communicated via transmitted coded messages to each other. Even if the British were able to intercept the messages, they could not understand what they meant, as the Germans had used a machine called the Enigma, which was able to code and decode the messages via the same process, given a key.
Projects Day
What:
Cross-platform web application to send messages safely and securely
How:
Text messages will be converted to black and white images
The image will be dissected into pixels, which can then be compressed into strings through image compression
These strings can then be encrypted before being converted back into an image, which contains random black and white pixels
This image may be embedded into another image with to obtain a fixed file size, and noise will be added for the other parts of the image.
This image is then sent to the other user, where the process is reversed and the original message can be obtained
The message can be handwritten for further security as it is more difficult to spot font patterns in handwritten messages and text messages
Who (Target Audience):
Everyone
When (Proposed Timeline):
December Holidays: Read on various encryption methods and build up a formidable research pool
T1W1 to T1W8: Decide on language used, begin coding algorithm (for encryption of binary)
T1W9-End of March Holidays: Draft out project's day powerpoint and continue coding
T2W1-Prelims: Finish coding, research on different ways to convert different types of images (jpg, emf, bmp, png etc.) into binary form, rehearse presentation
Prelims-T2W9: Code an image-to-binary algorithm for bmp, possible extensions to other file formats if possible
T2W10-End of June Holidays: Converting code such that it is suitable for the platform/application (i.e. iPhone app), Uploading onto platform, test runs
T3W1-Semi-finals: Upgrading code (Look for more efficient algorithms that achieve the same level of security), Preparing for presentation
Semi-final to Finals: Promoting application to test subjects
Finals to Grand-Finals: Feedback
Why (Advantages):
Handwritten messages are more unpredictable than typewritten messages
Image will be hard to decrypt using conventional means (there are nCK combinations of black and white pixels)
No one would guess that a weird image would be a secret message!
Brute force cannot be used even if the hacker knows the algorithm but not the key, as the computer cannot recognise that an image is actual text (unless it uses OCR, which is extremely time-consuming, or if the hacker sits at the computer rejecting wrong decoded messages all the time)
Possible Extensions:
Image size can be tweaked (i.e. variables in encryption code change as image size changes)
Colour Images can be included
Adding additional layers of security (e.g. a password to access the image, for starters)
Mr Tan's Feedback
Everything is in place from Intro to Methodology. However, nothing on eXperimentation/disscussion/Conclusion
Things to do
1) Methodology
- State the method use to create CAPTCHAs (Algo)
- Concept behind the algo
- Comparison & distinction from other Methods
2) Discussion - Examples of your Captchas
- Test setups
- Testing it on machines (?%)
- Testing on Humans (?%)
- Test Result discussions
3) Conclusion - How effective is your algo?